Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Fake KakaoTalk security plug-in

The Android/FakeKakao trojan monitors incoming and outgoing SMS messages, sends SMS spam and gathers sensitive information as well as incorporating anti-debugging and anti-emulator tricks and disabling some security software. Zhe Li and Dong Xie take…

Read more  

Onkod: a downloader and its 'downloadee'

Downloaders are usually small and simple files whose goal is purely to download the ‘main course’ of a malware infection. The downloaded file (or ‘downloadee’) invariably has more features and functionalities than the downloader. Raul Alvarez looks…

Read more  

Surveillance and servility: is the AV industry a puppet of statecraft?

Samir Mody (K7 Computing)

‘Surveillance has been an instrument of statecraft for millennia.' Samir Mody, K7 Computing

Read more  

Greetz from academe: Santa's got a gun

In the latest of his ‘Greetz from Academe’ series, highlighting some of the work going on in academic circles, John Aycock looks at a tool designed to detect JavaScript containing malicious evasions.

Read more  

Governments seek to boost cyber defences & skills

UK starts recruitment for Cyber Reserve Unit; India plans to increase number of reverse engineering professionals.

Read more  

Finnish government breach

Finnish Ministry of Foreign affairs breached over four-year period.

Read more  

Employee awareness and security budgets still found lacking

Only 17% of respondents in Ernst & Young survey say their company’s information security function fully meets the needs of their organization.

Read more  

Greetz from academe: Monkey vs. Python

Python obfuscation is relatively rare. In the latest of his ‘Greetz from academe’ series, highlighting some of the work going on in academic circles, John Aycock takes a look at a research paper in which the authors reverse engineered a 'hardened'…

Read more  

Neurevt bot analysis

Neurevt is a relatively new HTTP bot that already has a lot of functionalities along with an extendable and flexible infrastructure. Zhongchun Huo takes a detailed look at its infrastructure, communication protocol and encryption scheme.

Read more  

Another tussle with Tussie

When one has a nice idea – such as a tricky method for encoding data – it is common to take that idea and improve on it. It is rare to see someone take such an idea and degenerate it, but that’s exactly what we see in W32/Tussie.B. Peter Ferrie…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.